Patching
Encryption
Encrypted File System (EFS)
Full Disk Encryption (FDE)
Application Data Encryption
Monitoring
Sensors
Network Based Sensors
Host-Based Sensors
Collectors
Examples of Collectors
Security Information and Event Management SIEM
Least Privilege
Configuration Enforcement
If System is Out-of-Date According to Configuration Enforcement Procedures
Decomissioning
Other Options Before Decomissioning